browser-automation-notte
Pass
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXPOSURE]: The skill reads authentication credentials from
~/.gooseworks/credentials.jsonto access the author's browser automation platform. This is a standard procedure for this vendor's services. - [COMMAND_EXECUTION]: Uses
python3 -cto extract keys from local configuration files andnpxto execute the vendor's login utility for setup. - [INDIRECT_PROMPT_INJECTION]: The skill is designed to ingest and process data from external websites, which presents a surface for indirect prompt injection.
- Ingestion points: Web content retrieved via
Scrape Webpage,Scrape Page, and autonomous tasks inStart Agent. - Boundary markers: Not explicitly defined in the instruction set.
- Capability inventory: Includes browser interaction through
Execute Page Actionand autonomous task execution viaStart Agent. - Sanitization: No specific sanitization or filtering of external content is documented within the skill instructions.
Audit Metadata